![]() |
| Hackers |
Hackers exploiting free compute game fans
A company specializing in information security has warned that hackers are targeting free electronic game users with new malware to exploit computers in Mine Cryptocurrencies, which develop digital currencies using computer processors. The process of doing.
A report released by Avast
The report, released by Avast, states that free versions of games such as NBA 2K19, Grand Theft Auto V and Far Cry 5, "The Sims 4", and "Jurassic World Evolution" are a new genre. Has malware called "Krykonosh"?
"We have received a new piece of malware that we are now calling Kraconish for a possible indication that the author of the malware may be in check. Deployed and many popular anti-virus programs have been disabled. "The security company wrote," Under anti-malware detection tactics.
Everest has found that malware is still being used to generate at least 2 million worth of cryptocurrencies by June 2018, using the processor power of gamers who use the software while programs silently access their devices.
Cryptocurrency mining places an additional burden on computer processors and is bound to slow down or even destroy the PC. If this continues, scam victims may soon feel the need to change their computers.
To give a glimpse of how much electricity is used by this process, Cambridge researchers say that the "mining" cryptocurrency for bitcoin uses about 121.36 TWh each year. Bitcoins have higher power consumption (121 TWh) and higher than the Netherlands (108.8 TWh), with some questioning whether corrupt mining is ethical.
About 220,000 users worldwide are affected and 800 devices are attacked daily, Daniel Bains, an Everest researcher, told CNBC. This is just the number of devices with Avast Anti-Virus installed, which means the actual number could be much higher.
Kronos was spotted when some Avast users complained that their security software was missing, as malware disables Windows Update and removes security software for their own protection.
As long as people continue to download cracked software, such attacks will still be useful to hackers," Benis said. The key to this type of attack is that you can't really get anything, so when you try to steal software, chances are someone is trying to steal from you.



0 Comments